NoGoolag
4.64K subscribers
19.6K photos
10.9K videos
752 files
19.7K links
Live free!

📡 @NoGoolag

FAQ:
http://t.me/NoGoolag/169

★Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

📡 @Libreware

📚 @SaveAlexandria

📡 @BallMemes

FORWARDS ARE NOT ENDORSEMENTS

💯 % satire OSINT
Download Telegram
Skynet 2024: The infrastructure is complete

The last piece in the infrastructure that allows the operation of Skynet is now in place just announced a week ago. With this piece the advent of wireless peer to peer command and control of devices and robotics now become possible in full, with a range to affect all of the world.

https://odysee.com/Skynet-x1#c7d77f5cfe7b4c13737487e6d5c67831e387daaf

#Google #apple #surveillance #why
#WhatsApp, #Signal and #Telegram among apps cut from #iPhone app store to comply with censorship demand

#China ordered #Apple to remove some of the world’s most popular chat messaging apps from its app store in the country, the latest example of censorship demands on the iPhone seller in the company’s second-biggest market.

https://www.wsj.com/tech/apple-removes-whatsapp-threads-from-china-app-store-on-government-orders-a0c02100
#Apple has been saving all your deleted files and data.
#cloud #ios
Apple intelligence is dumb

At WWDC 2024, Apple announced its first major AI feature "Apple Intelligence", which brings a suite of new tools to the iPhone and Mac.

#Apple has it's own foundation models, but will also rely on #OpenAI in the cloud for certain #AI jobs.

https://odysee.com/lol-apple-intelligence-is-dumb...#0111775c34ba991ff57ffd7f93c134fafe49c9af
Apple’s requirements to hit creators and fans on Patreon | Patreon

Patreon is a pretty popular system that allows you to sponsor artists or app developers. Now Apple requires 30% of everything paid to developers via Patreon for iPhone apps.

Because too much money is never enough. (It's not like #Apple is one of the richest companies in tech, huh.)

#Patreon #EvilApple
This media is not supported in your browser
VIEW IN TELEGRAM
How complicit is #Apple in the Palestinian extermination program?
#bds #why
#Apple silently uploads your #passwords and keeps them
October 31 2024

https://lapcatsoftware.com/articles/2024/10/4.html

This is a follow-up to my blog post macOS Sonoma silently enabled iCloud Keychain despite my precautions from five months ago. The TL;DR of that blog post is that when you have iCloud enabled but not iCloud Keychain, updating from Ventura to Sonoma causes iCloud Keychain to be silently enabled. (I don't know yet whether that still occurs when updating from Sonoma to Sequoia.) What I didn't realize at the time, indeed didn't realize until now, is that iCloud Keychain already uploaded all of my passwords and kept them in iCloud even after I disabled iCloud Keychain...
#Apple removed its Advanced Data Protection for UK users following government demands for backdoor access, allowing Apple and law enforcement to access iCloud photos and documents

https://www.theguardian.com/technology/2025/feb/21/apple-removes-advanced-data-protection-tool-uk-government
UK Tribunal Blocks Secret Gov’t Case Against Apple Encryption

A government that demands invisibility in court is one step away from disappearing accountability altogether.

With a necessary reality check, a #UK tribunal has told the government that, no, it cannot hold a secret legal battle against #Apple over #encryption. The Investigatory Powers Tribunal (#IPT), the body meant to oversee the country’s surveillance powers, has dismissed efforts by the Home Office to keep the entire case hidden from public view. And in doing so, it has delivered a quietly important win for press freedom and digital rights. Although, things are far from over.

@reclaimthenet
#BigBrother #OnlineSafetyBill #OnlineSafetyAct
Targeted iPhone attacks in the wild.

#Apple just patched 2 new zero-days—bringing 2025’s total to 5 actively exploited flaws.

→ One lets hackers run code via malicious audio files
→ Another bypasses Pointer Authentication using memory tricks

Update now: #iOS 18.4.1, #macOS Sequoia 15.4.1, #tvOS, #visionOS

@thehackernews
Media is too big
VIEW IN TELEGRAM
Your new #iPhone’s #AI is Spying on You — And #Apple Built It That Way
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted | The Citizen Lab

On April 29, 2025, a select group of iOS users were notified by Apple that they were targeted with advanced spyware. Among the group were two journalists that consented for the technical analysis of their cases. The key findings from our forensic analysis of their devices are summarized below:

Our forensic analysis concluded that one of the journalist’s devices was compromised with Paragon’s Graphite spyware in January and early February 2025 while running iOS 18.2.1. We attribute the compromise to Graphite with high confidence because logs on the device indicated that it made a series of requests to a server that, during the same time period, matched our published Fingerprint P1. We linked this fingerprint to Paragon’s Graphite spyware with high confidence.

#ParagonGraphite #Graphite #Apple #iOS
Media is too big
VIEW IN TELEGRAM
How Much Data Are #Apple & #Google Really Collecting?

In my interview with 7Sees, we broke down just how much data Big Tech is harvesting from your phone—even when you're not using it.

A study out of Trinity College in Dublin found that across U.S. users, Apple collects about 12GB of data every 12 hours—that’s like 6 full-length movies. But Google? They collect 20 times that. Over 1 terabyte.

This isn’t just background activity—it’s a billion-dollar spy industry disguised as convenience.

📺 Full interview: Big Tech's Billion Dollar Spy Industry


🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
#why
📱 Critical zero-click vulnerability (CVE-2025-55177) within #WhatsApp has been leveraged in targeted #spyware operations, in conjunction with an #Apple Imagel0 flaw (CVE-2025-43300).

This combination enabled malicious actors to disseminate exploits via WhatsApp, resulting in potential data exfiltration from the user's Apple device.

The attack sequence involved:
🚫Attacker-controlled delivery
🚫Malicious DNG/remote image (Imagel0) parsing vulnerability (OOB write)
Remote code execution
All occurring without user engagement.

https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/

https://blog.quarkslab.com/patch-analysis-of-Apple-iOS-CVE-2025-43300.html

#iphone #ios